Conditional Access and other systems Sample Clauses

The 'Conditional Access and other systems' clause defines the requirements and obligations related to controlling access to digital content or services. It typically outlines how access control technologies, such as encryption or authentication systems, must be implemented and maintained to prevent unauthorized use or distribution. For example, it may specify the technical standards to be used or the responsibilities of each party in managing these systems. The core function of this clause is to protect intellectual property and ensure that only authorized users can access certain content, thereby reducing the risk of piracy or unauthorized distribution.
Conditional Access and other systems. 4.1 The Operator shall ensure that the Subscribed Channels are broadcast in an encrypted form and in a form capable of Fingerprinting. 4.2 The Operator represents and warrants that: (a) both the CAS and SMS shall be of a reputed organization and are currently being used by other pay television services that have, in aggregate, at least 1 million subscribers in the global pay television market; (b) none of the current versions of the CAS have been hacked; (c) to the best of its knowledge, there are no devices or software available anywhere in the world that is capable of hacking or invalidating the Fingerprinting technology; and (d) both its CAS and SMS shall be integrated and any activation/de-activation shall be processed simultaneously through both systems. 4.3 The Operator agrees that it shall, at its sole cost, be responsible for ensuring the Subscribed Channels are distributed via a digital, encrypted format signal receivable only by its bona fide Subscribers.
Conditional Access and other systems. 4.1 The Operator shall ensure that the Subscribed Channel(s) are broadcast in an encrypted form and in a form capable of fingerprinting. 4.2 The Operator represents and warrants that: (a) both the CAS and SMS shall be of a reputed organization and are currently being used by other pay television services that have, in aggregate, at least one (1) million subscribers in the global pay television market; (b) none of the current versions of the CAS have been hacked;
Conditional Access and other systems. 4.1 DPO shall ensure that the Subscribed Channels are broadcast in an encrypted form and in a form capable of Fingerprinting. 4.2 DPO represents and warrants that: (a) both the CAS and SMS shall be of a reputed organization and are currently being used by other pay television services that have, in aggregate, at least 1 million subscribers in the global pay television market; (b) none of the current versions of the CAS have been hacked; (c) to the best of its knowledge, there are no devices or software available anywhere in the world that is capable of hacking or invalidating the Fingerprinting technology; and (d) both its CAS and SMS shall be integrated and any activation/de-activation shall be processed simultaneously through both systems. 4.3 DPO agrees that it shall, at its sole cost, be responsible for ensuring the Subscribed Channels are distributed via a digital, encrypted format signal receivable only by its bona fide Subscribers.
Conditional Access and other systems. 4.1 Affiliate shall ensure that the Channel are broadcast in an encrypted form and in a form capable of Fingerprinting. 4.2 Affiliate represents and warrants that: (a) both the CAS and SMS shall be of a reputed organization and are currently being used by other pay television services that have, in aggregate, at least 1 million subscribers in the global pay television market; (b) none of the current versions of the CAS have been hacked; (c) to the best of its knowledge, there are no devices or software available anywhere in the world that is capable of hacking or invalidating the Fingerprinting technology; and
Conditional Access and other systems. 4.1 The IPTV Operator shall ensure that the Channels are broadcast in an encrypted form and in a form capable of Fingerprinting. 4.2 The IPTV Operator represents and warrants that: (a) both the Conditional Access and Subscriber billing systems shall be of a reputed organization; (b) none of the current versions of the Conditional Access system have been hacked; (c) to the best of its knowledge, there are no devices or software available anywhere in the world that is capable of hacking or invalidating the Fingerprinting technology; and (d) both its Conditional Access and Subscriber Management Systems shall be integrated and any activation/de-activation shall be processed simultaneously through both systems. 4.3 The IPTV Operator agrees that it shall, at its sole cost, be responsible for ensuring the Channels are distributed via a digital, encrypted format signal receivable only by its bona fide Subscribers to the Channels.
Conditional Access and other systems. 4.1 Operator agrees that it shall, at its sole cost, be responsible for ensuring the Channel(s) is distributed via a digital, encrypted format signal receivable through its conditional access system (“Conditional Access”) only by its bona fide Subscribers to the Channel(s). 4.2 Operator agrees that: (a) both the Conditional Access and Subscriber billing systems shall be of a reputed organization and are currently being used by other pay television services that have, in aggregate, at least 1 million subscribers in the global pay television market outside of the Territory; and (b) both its Conditional Access and subscriber management systems shall be integrated and any activation/de-activation shall be processed simultaneously through both systems.
Conditional Access and other systems. 4.1 The DTH OPERATOR shall ensure that the Subscribed Channels are broadcast in an encrypted form and in a form capable of Fingerprinting. 4.2 The DTH OPERATOR represents and warrants that: (a) both the CAS and SMS shall be of a reputed organization and are currently being used by other pay television services that have, in aggregate, at least 1 million subscribers in the global pay television market; (b) none of the current versions of the CAS have been hacked; (c) to the best of its knowledge, there are no devices or software available anywhere in the world that is capable of hacking or invalidating the Fingerprinting technology; and (d) both its CAS and SMS shall be integrated and any activation/de-activation shall be processed simultaneously through both systems. 4.3 The DTH OPERATOR agrees that it shall, at its sole cost, be responsible for ensuring the Subscribed Channels are distributed via a digital, encrypted format signal receivable only by its bona fide Subscribers. 4.4 All activations and deactivations shall be performed only through SMS and not CAS.

Related to Conditional Access and other systems

  • Network Elements and Other Services Manual Additive 2.13.5.1 The Commissions in some states have ordered per-element manual additive non- recurring charges (NRC) for Network Elements and Other Services ordered by means other than one of the interactive interfaces. These ordered Network Elements and Other Services manual additive NRCs will apply in these states, rather than the charge per LSR. The per-element charges are listed on the Rate Tables in Exhibit C.

  • FACILITIES, EQUIPMENT AND OTHER MATERIALS Except as otherwise specifically provided in this Agreement, CONTRACTOR shall, at its sole cost and expense, furnish all facilities, equipment, and other materials which may be required for performing services pursuant to this Agreement. At COUNTY’s discretion, COUNTY may make equipment or facilities available to CONTRACTOR for CONTRACTOR’s use in furtherance of this Agreement only where a COUNTY Facility or Equipment exhibit is attached to this Agreement identifying the equipment or facilities to be used by CONTRACTOR’s personnel. If COUNTY funds equipment as part of this contract, COUNTY will retain Equipment.

  • Utilities and Other Services 4.4.1 The Tenant shall arrange, at its own cost and expense, for the installation, connection and supply of all utilities and any other services required by it at or in relation to the Premises. 4.4.2 The Tenant shall pay to the suppliers, and indemnify the Landlord against, all charges for the installation, connection and supply of all utilities and any other services consumed or used at or in relation to the Premises and the Tenant shall comply with the requirements and regulations of the respective suppliers. Tenant to initial 4.4.3 For the purposes of this Clause 4.4, the term “utilities” shall include water, electricity, telecommunications network, gas and any water-borne sewerage systems.

  • Equipment and Other Tangible Property The Company or one of its Subsidiaries owns and has good title to, and has the legal and beneficial ownership of or a valid leasehold interest in or right to use by license or otherwise, all material machinery, equipment and other tangible property reflected on the books of the Company and its Subsidiaries as owned by the Company or one of its Subsidiaries, free and clear of all Liens other than Permitted Liens. All material personal property and leased personal property assets of the Company and its Subsidiaries are structurally sound and in good operating condition and repair (ordinary wear and tear expected) and are suitable for their present use.

  • Administrative and Other Services (a) Subadviser will, at its expense, furnish (i) all necessary investment and management facilities, including salaries of personnel required for it to execute its duties faithfully, and (ii) administrative facilities, including bookkeeping, clerical personnel and equipment necessary for the efficient conduct of the investment affairs of the Fund (excluding determination of net asset values and shareholder accounting services). (b) Subadviser will maintain all accounts, books and records with respect to the Fund as are required of an investment adviser of a registered investment company pursuant to the Investment Company Act and the rules thereunder. Subadviser agrees that such records are the property of the Trust, and will be surrendered to the Trust promptly upon request. The Manager shall be granted reasonable access to the records and documents in Subadviser’s possession relating to the Funds. (c) Subadviser shall provide such information as is necessary to enable Manager to prepare and update the Trust’s registration statement (and any supplement thereto) and the Fund’s financial statements. Subadviser understands that the Trust and Manager will rely on such information in the preparation of the Trust’s registration statement and the Fund’s financial statements, and hereby covenants that any such information approved by Subadviser expressly for use in such registration and/or financial statements shall be true and complete in all material respects. (d) Subadviser will vote the Fund’s investment securities in the manner in which Subadviser believes to be in the best interests of the Fund, and shall review its proxy voting activities on a periodic basis with the Trustees.